<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.11 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc strict="yes"?>
<?rfc compact="yes"?>

<rfc ipr="trust200902" docName="draft-toutain-schc-access-control-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="SCHC AC">SCHC Rule Access Control</title>

    <author initials="A." surname="Minaburo" fullname="Ana Minaburo">
      <organization>Consultant</organization>
      <address>
        <postal>
          <street>Rue de Rennes</street>
          <city>35510 Cesson-Sevigne Cedex</city>
          <country>France</country>
        </postal>
        <email>anaminaburo@gmail.com</email>
      </address>
    </author>
    <author initials="L." surname="Toutain" fullname="Laurent Toutain">
      <organization>Institut MINES TELECOM; IMT Atlantique</organization>
      <address>
        <postal>
          <street>2 rue de la Chataigneraie</street> <street>CS 17607</street>
          <city>35576 Cesson-Sevigne Cedex</city>
          <country>France</country>
        </postal>
        <email>Laurent.Toutain@imt-atlantique.fr</email>
      </address>
    </author>
    <author initials="I." surname="Martinez" fullname="Ivan Martinez">
      <organization>Nokia Bell Labs</organization>
      <address>
        <postal>
          <street>12 Rue Jean Bart</street>
          <city>91300 Massy</city>
          <country>France</country>
        </postal>
        <email>ivan.martinez_bolivar@nokia-bell-labs.com</email>
      </address>
    </author>

    <date year="2023" month="October" day="22"/>

    <area>Internet</area>
    <workgroup>SCHC Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>The framework for SCHC defines an abstract view of the rules, formalized through a YANG Data Model. In its original description, rules are static and shared by two endpoints. This document defines defines augmentation to the existing Data Model in order to restrict the changes in the rule and, therefore, the impact of possible attacks.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>SCHC is a compression and fragmentation mechanism defined in <xref target="RFC8724"/> while <xref target="RFC9363"/> provides a YANG Data Model for formal representation of SCHC Rules used either for compression/decompression (C/D) or fragmentation/reassembly (F/R). The inappropriate changes to SCHC Rules leads to some possible attacks. The goal of this document is to define a augmentation to the existing Data Model in order to restrict the changes in the rules and, therefore, the impact of possible attacks.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>It is expected that the reader will be familiar with the terms and concepts associated with the SCHC framework <xref target="RFC8724"/>, <xref target="I-D.ietf-schc-architecture"/>, and managmente request processing <xref target="I-D.ietf-core-comi"/>, NETCONF<xref target="RFC6241"/>, RESTCONF <xref target="RFC8040"/>.</t>

<t>ToDo
* Access Control.
* Management request processing: The NETCONF, RESTCONF or CORECONF request is processed and passed to the end-point Rule Manager.
* Rule Manager (RM).
* Context. SCHC Rules</t>

</section>
<section anchor="schc-tvmocda-possible-combinations"><name>SCHC TV/MO/CDA possible combinations</name>

<t>SCHC compression behavior uses the TV, MO, and CDA to generate the correct residue. But not all the combinations of this fields descriptors are possible, and then an attack can be detected or avoided. <xref target="Fig-combinations"/> shows all the combinations and those that are enabled. SCHC defines two TV values: set and not set. SCHC MO can be Equal, Ignore, MSB, or Match-mapping. And SCHC CDA can be not-sent, value-sent, mapping-sent, LSB, compute-*, DevIID, or AppIID.</t>

<figure title="SCHC TV, MO, CDA valid combinations" anchor="Fig-combinations"><artwork><![CDATA[
+--------------+----------------------------------------------------+
|              |                      CDA                           |
| TV   /  MO   +--------+---------------+---+---------+------+------+
|              |not-sent| value |mapping|LSB|compute-*|DevIID|AppIID|
|              |        | -sent | -sent |   |         |      |      |  
+==============+========+=======+=======+===+=========+======+======+
| set  / Equal |  ok    |absurd |   x   | x | absurd  |absurd|absurd|
+--------------+--------+-------+-------+---+---------+------+------+
|not set /Equal|   x    |   x   |   x   | x | absurd  |absurd|absurd|
+--------------+--------+-------+-------+---+---------+------+------+
| set / Ignore | ok (D) | absurd|    x  | x |   ok    |  ok  |  ok  |
+--------------+--------+-------+-------+---+---------+------+------+
|not set/Ignore|   x    |  ok   |    x  | x |   ok    |  ok  |  ok  |
+--------------+--------+-------+-------+---+---------+------+------+
| set  /   MSB | absurd |absurd |    x  | ok|  absurd |absurd|absurd|
+--------------+--------+-------+-------+---+---------+------+------+
|not set / MSB | absurd | absurd|    x  | ok|  absurd |absurd|absurd|
+--------------+--------+-------+-------+---+---------+------+------+
| set  /  Match|   x    | absurd|   ok  | x |  absurd |absurd|absurd|
|      -mapping|        |       |       |   |         |      |      |
+--------------+--------+-------+-------+---+---------+------+------+
|not set/ Match|   x    |   x   | absurd| x |  absurd |absurd|absurd|
|      -mapping|        |       |       |   |         |      |      |
+--------------+--------+-------+-------+---+---------+------+------+

]]></artwork></figure>

</section>
<section anchor="yang-access-control"><name>YANG Access Control</name>

<t>YANG language allows to specify read-only or read write nodes. NACM <xref target="RFC8341"/> extends this by allowing users or groups of users to perform specific actions.</t>

<t>This granularity does not fit this rule model. For instance, the goal is not to allow all the field-id leaves to be modified. The objective is to allow a specific rule entry to be changed and, therefore, some of the leaves to be modified. For instance, an entry with FID containing Uri-path may have its target value modified, as in the same rule, the entry regarding the application prefix should not be changed.</t>

<t>The SCHC access control augments the YANG module defined in <xref target="RFC9363"/> to allow a remote entity to manipulate the rules. Several levels are defined.</t>

<t><list style="symbols">
  <t>in the set of rules, it authorizes or not a new rule to be added.</t>
  <t>in a compression rule, it allows adding or removing field descriptions.</t>
  <t>in a compression rule, it allows modifying some elements of the rule, such as the TV, MO, or/and CDA, and associated values.</t>
  <t>in a fragmentation rule, it allows modifying some parameters.</t>
</list></t>

</section>
<section anchor="yang-data-model"><name>YANG Data Model</name>

<t>The YANG DM proposed in <xref target="AnnexA"/> extends the SCHC YANG Data Model introduced in <xref target="RFC9363"/>. It adds read-only leaves containing access rights. If these leaves are not present, the information cannot be modified.</t>

<section anchor="leaf-ac-modify-set-of-rules"><name>leaf ac-modify-set-of-rules</name>

<t>This leaf controls modifications applied to a set of rules. They are specified with the rule-access-right enumeration:</t>

<t><list style="symbols">
  <t>no-change (0): rules cannot be modified in the Set of Rules. This is the equivalent of having no access control elements in the set of rules.</t>
  <t>modify-existing-element (1): an existing rule may be modified.</t>
  <t>add-remove-element (2): a rule can be added or deleted from the Set of Rules, or an existing rule can be modified.</t>
</list></t>

</section>
<section anchor="leaf-ac-modify-compression-rule"><name>leaf ac-modify-compression-rule</name>

<t>This leaf allows to modify a compression element. To be active, leaf ac-modify-set-of-rules <bcp14>MUST</bcp14> be set to modify-existing-element or add-remove-element. This leaf uses the same enumeration as add-remove-element:</t>

<t><list style="symbols">
  <t>no-change (0): The rule cannot be modified.</t>
  <t>modify-existing-element (1): an existing Field Description may be modified.</t>
  <t>add-remove-element (2): a Field Description can be added or deleted from the Rule or an existing rule can be modified.</t>
</list></t>

</section>
<section anchor="leaf-ac-modify-field"><name>leaf ac-modify-field</name>

<t>This leaf allows to modify a Field Description in a compression rule. To be active, leaves ac-modify-set-of-rules and ac-modify-compression-rule <bcp14>MUST</bcp14> be set to modify-existing-element  or add-remove-element and ac-modify-compression-rule and leaf</t>

<section anchor="coap-base-header-access-control"><name>CoAP base header Access Control.</name>

<t>CoAP protocol uses a request/reply model with compact messages.
The format of these messages starts with a fixed format of 4-byte length,
followed by a variable Token format with a length between 0 and 8 bytes.
While applying SCHC header compression <xref target="RFC8824"/>, the based header is only readable and <bcp14>MUST</bcp14> not be modified.
<xref target="Figure-CoAPHeader"/> shows the access-control for the FID and TV in a Rules.</t>

<figure title="Access Control for the CoAP Header" anchor="Figure-CoAPHeader"><artwork><![CDATA[

+----------+--------------+---+--+--+----------+----------+
|   Access |     FID      | FL|FP|DI| Access   |    TV    |
|  Control |              |   |  |  | Control  | (default |
|    FID   |              |   |  |  |    TV    |  value)  |
+----------+--------------+---+--+--+----------+----------+
| Read Only| CoAP.Version | 2 | 1|Bi|Read Only |     1    |
+----------+--------------+---+--+--+----------+----------+
| Read Only| CoAP.Type    | 2 | 1|Bi|Read Only |CON,NON-C,|
|          |              |   |  |  |          |ACK, RST. |
+----------+--------------+---+--+--+----------+----------+
| Read Only| CoAP.TKL     | 4 | 1|Bi|Read/Write|   none   |
+----------+--------------+---+--+--+----------+----------+
| Read Only| CoAP.Code    | 8 | 1|Bi|Read Only |See CoAP  |
|          |              |   |  |  |          |Code      |
|          |              |   |  |  |          |Registries|
+----------+--------------+---+--+--+----------+----------+
| Read Only|CoAP.MessageID| 16| 1|Bi|Read/Write|   none   |
+----------+--------------+---+--+--+----------+----------+
| Read Only|  CoAP.Token  |0-8| 1|Bi|Read/Write|   none   |
+----------+--------------+---+--+--+----------+----------+


]]></artwork></figure>

</section>
<section anchor="coap-options-access-control"><name>CoAP Options Access Control.</name>

<t>The CoAP options are used by both request and responses messages.
Some of them are defined as repeatable which implies that it <bcp14>MAY</bcp14> be included one or more times in a message.
In this case, a SCHC Rule <bcp14>MAY</bcp14> be able to modify the FID and the TV in order to include the repetition.
The only FID's that have access to be modifiable are those that have been defined as repeatable.
The <xref target="Figure-CoAPOptions"/> give the control access for all the CoAP Options defined in <xref target="RFC7252"/>;
<xref target="RFC8613"/>; <xref target="RFC8768"/>; <xref target="RFC9177"/>; <xref target="RFC7959"/>; and <xref target="RFC9175"/>.</t>

<figure title="CoAP Options access-control" anchor="Figure-CoAPOptions"><artwork><![CDATA[

+-------+----+--------------+------+---+--+-------+--------+
| Access|CoAP|     FID      |  FL  |FP |DI|Access |   TV   |
|Control|Opt.|              |      |   |  |Control|(default|
|  FID  |Num.|              |      |   |  |  TV   | value) |
+-------+----+--------------+------+---+--+-------+--------+
| Read/ | 1  | CoAP.Option. | 0-8  |var|Bi| Read/ |  none  |
| Write |    | If-Match     |      |   |  | Write |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  | 3  | CoAP.Option. |      |   |  | Read/ |Sect. 5 |
| Only  |    | Uri-Host     |1-255 |var|Bi| Write | RFC7252|
+-------+----+--------------+------+---+--+-------+--------+
| Read/ | 4  | CoAP.Option. |      |   |  | Read/ |  none  |
| Write |    | ETag         | 1-8  |var|Bi| Write |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  | 5  | CoAP.Option. |      |   |  | Read  | empty  |
| Only  |    |If-None-Match |  0   | 1 |Bi| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  | 6  | CoAP.Option. |      |   |  | Read  |  none  |
| Only  |    | Observe      | 0-3  |var|Bi| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  | 7  | CoAP.Option. |      |   |  | Read  |Sect. 5 |
| Only  |    | Uri-Port     | 0-2  |var|Bi| Only  |RFC7252 |
+-------+----+--------------+------+---+--+-------+--------+
| Read/ | 8  | CoAP.Option. |      |   |  | Read/ |  none  |
| Write |    |Location-Path | 0-255|var|Bi| Write |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  | 9  |CoAP.Option.  |      |   |  | Read  |  none  |
| Only  |    | OSCORE       |0-255 |var|Bi| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read/ | 11 | CoAP.Option. |      |   |  | Read/ |  none  |
| Write |    | Uri-Path     |0-255 |var|Bi| Write |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  | 12 | CoAP.Option. |      |   |  | Read  |  none  |
| Only  |    |Content-Format| 0-2  |var|Bi| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  | 14 | CoAP.Option. |      |   |  | Read  |   60   |
| Only  |    | Max-Age      | 0-4  |var|Bi| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read/ | 15 | CoAP.Option. |      |   |  | Read/ |  none  |
| Write |    | Uri-Query    |0-255 |var|Bi| Write |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  | 16 | CoAP.Option. |      |   |  | Read  |   16   |
| Only  |    | Hop-Limit    |  1   | 1 |Bi| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  | 17 | CoAP.Option. |      |   |  | Read  |  none  |
| Only  |    | Accept       | 0-2  |var|Bi| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  | 19 | CoAP.Option. |      |   |  | Read  |  none  |
| Only  |    | Q-Block1     | 0-3  |var|Bi| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read/ | 20 | CoAP.Option. |      |   |  | Read/ |  none  |
| Write |    |Location-Query|0-255 |var|Bi| Write |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  | 23 | CoAP.Option. |      |   |  | Read  |  none  |
| Only  |    | Block2       | 0-3  |var|Bi| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  | 27 | CoAP.Option. |      |   |  | Read  |  none  |
| Only  |    | Block1       | 0-3  |var|Bi| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  | 28 | CoAP.Option. |      |   |  | Read  |  none  |
| Only  |    | Size2        | 0-4  |var|Bi| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read/ | 31 | CoAP.Option. |      |   |  | Read/ |  none  |
| Write |    | Q-Block2     | 0-3  |var|Bi| Write |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  | 35 | CoAP.Option. |      |   |  | Read  |  none  |
| Only  |    | Proxy-Uri    |1-1034|var|Bi| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  | 39 | CoAP.Option. |      |   |  | Read  |  none  |
| Only  |    | Proxy-Scheme |1-255 |var|Bi| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  | 60 | CoAP.Option. |      |   |  | Read  |  none  |
| Only  |    | Size1        | 0-4  |var|Bi| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  |252 | CoAP.Option. |      |   |  | Read  |  none  |
| Only  |    | Echo         | 1-40 |var|Bi| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  |258 | CoAP.Option. |      |   |  | Read  |   0    |
| Only  |    | No-Response  | 0-1  | 1 |Up| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  |292 | CoAP.Option. |      |   |  | Read  |  none  |
| Only  |    | Request-Tag  | 0-8  |var|Bi| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+


]]></artwork></figure>

</section>
</section>
</section>


  </middle>

  <back>


    <references title='Normative References'>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname='S. Bradner' initials='S.' surname='Bradner'/>
    <date month='March' year='1997'/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='2119'/>
  <seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>

<reference anchor='RFC6241' target='https://www.rfc-editor.org/info/rfc6241'>
  <front>
    <title>Network Configuration Protocol (NETCONF)</title>
    <author fullname='R. Enns' initials='R.' role='editor' surname='Enns'/>
    <author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'/>
    <author fullname='J. Schoenwaelder' initials='J.' role='editor' surname='Schoenwaelder'/>
    <author fullname='A. Bierman' initials='A.' role='editor' surname='Bierman'/>
    <date month='June' year='2011'/>
    <abstract>
      <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6241'/>
  <seriesInfo name='DOI' value='10.17487/RFC6241'/>
</reference>

<reference anchor='RFC8040' target='https://www.rfc-editor.org/info/rfc8040'>
  <front>
    <title>RESTCONF Protocol</title>
    <author fullname='A. Bierman' initials='A.' surname='Bierman'/>
    <author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'/>
    <author fullname='K. Watsen' initials='K.' surname='Watsen'/>
    <date month='January' year='2017'/>
    <abstract>
      <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8040'/>
  <seriesInfo name='DOI' value='10.17487/RFC8040'/>
</reference>

<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname='B. Leiba' initials='B.' surname='Leiba'/>
    <date month='May' year='2017'/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='8174'/>
  <seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>

<reference anchor='RFC8724' target='https://www.rfc-editor.org/info/rfc8724'>
  <front>
    <title>SCHC: Generic Framework for Static Context Header Compression and Fragmentation</title>
    <author fullname='A. Minaburo' initials='A.' surname='Minaburo'/>
    <author fullname='L. Toutain' initials='L.' surname='Toutain'/>
    <author fullname='C. Gomez' initials='C.' surname='Gomez'/>
    <author fullname='D. Barthel' initials='D.' surname='Barthel'/>
    <author fullname='JC. Zuniga' initials='JC.' surname='Zuniga'/>
    <date month='April' year='2020'/>
    <abstract>
      <t>This document defines the Static Context Header Compression and fragmentation (SCHC) framework, which provides both a header compression mechanism and an optional fragmentation mechanism. SCHC has been designed with Low-Power Wide Area Networks (LPWANs) in mind.</t>
      <t>SCHC compression is based on a common static context stored both in the LPWAN device and in the network infrastructure side. This document defines a generic header compression mechanism and its application to compress IPv6/UDP headers.</t>
      <t>This document also specifies an optional fragmentation and reassembly mechanism. It can be used to support the IPv6 MTU requirement over the LPWAN technologies. Fragmentation is needed for IPv6 datagrams that, after SCHC compression or when such compression was not possible, still exceed the Layer 2 maximum payload size.</t>
      <t>The SCHC header compression and fragmentation mechanisms are independent of the specific LPWAN technology over which they are used. This document defines generic functionalities and offers flexibility with regard to parameter settings and mechanism choices. This document standardizes the exchange over the LPWAN between two SCHC entities. Settings and choices specific to a technology or a product are expected to be grouped into profiles, which are specified in other documents. Data models for the context and profiles are out of scope.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8724'/>
  <seriesInfo name='DOI' value='10.17487/RFC8724'/>
</reference>

<reference anchor='RFC8824' target='https://www.rfc-editor.org/info/rfc8824'>
  <front>
    <title>Static Context Header Compression (SCHC) for the Constrained Application Protocol (CoAP)</title>
    <author fullname='A. Minaburo' initials='A.' surname='Minaburo'/>
    <author fullname='L. Toutain' initials='L.' surname='Toutain'/>
    <author fullname='R. Andreasen' initials='R.' surname='Andreasen'/>
    <date month='June' year='2021'/>
    <abstract>
      <t>This document defines how to compress Constrained Application Protocol (CoAP) headers using the Static Context Header Compression and fragmentation (SCHC) framework. SCHC defines a header compression mechanism adapted for Constrained Devices. SCHC uses a static description of the header to reduce the header's redundancy and size. While RFC 8724 describes the SCHC compression and fragmentation framework, and its application for IPv6/UDP headers, this document applies SCHC to CoAP headers. The CoAP header structure differs from IPv6 and UDP, since CoAP uses a flexible header with a variable number of options, themselves of variable length. The CoAP message format is asymmetric: the request messages have a header format different from the format in the response messages. This specification gives guidance on applying SCHC to flexible headers and how to leverage the asymmetry for more efficient compression Rules.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8824'/>
  <seriesInfo name='DOI' value='10.17487/RFC8824'/>
</reference>

<reference anchor='RFC9363' target='https://www.rfc-editor.org/info/rfc9363'>
  <front>
    <title>A YANG Data Model for Static Context Header Compression (SCHC)</title>
    <author fullname='A. Minaburo' initials='A.' surname='Minaburo'/>
    <author fullname='L. Toutain' initials='L.' surname='Toutain'/>
    <date month='March' year='2023'/>
    <abstract>
      <t>This document describes a YANG data model for the Static Context Header Compression (SCHC) compression and fragmentation Rules.</t>
      <t>This document formalizes the description of the Rules for better interoperability between SCHC instances either to exchange a set of Rules or to modify the parameters of some Rules.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9363'/>
  <seriesInfo name='DOI' value='10.17487/RFC9363'/>
</reference>

<reference anchor='RFC8341' target='https://www.rfc-editor.org/info/rfc8341'>
  <front>
    <title>Network Configuration Access Control Model</title>
    <author fullname='A. Bierman' initials='A.' surname='Bierman'/>
    <author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'/>
    <date month='March' year='2018'/>
    <abstract>
      <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
      <t>This document obsoletes RFC 6536.</t>
    </abstract>
  </front>
  <seriesInfo name='STD' value='91'/>
  <seriesInfo name='RFC' value='8341'/>
  <seriesInfo name='DOI' value='10.17487/RFC8341'/>
</reference>

<reference anchor='RFC7252' target='https://www.rfc-editor.org/info/rfc7252'>
  <front>
    <title>The Constrained Application Protocol (CoAP)</title>
    <author fullname='Z. Shelby' initials='Z.' surname='Shelby'/>
    <author fullname='K. Hartke' initials='K.' surname='Hartke'/>
    <author fullname='C. Bormann' initials='C.' surname='Bormann'/>
    <date month='June' year='2014'/>
    <abstract>
      <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
      <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7252'/>
  <seriesInfo name='DOI' value='10.17487/RFC7252'/>
</reference>

<reference anchor='RFC8613' target='https://www.rfc-editor.org/info/rfc8613'>
  <front>
    <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
    <author fullname='G. Selander' initials='G.' surname='Selander'/>
    <author fullname='J. Mattsson' initials='J.' surname='Mattsson'/>
    <author fullname='F. Palombini' initials='F.' surname='Palombini'/>
    <author fullname='L. Seitz' initials='L.' surname='Seitz'/>
    <date month='July' year='2019'/>
    <abstract>
      <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
      <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8613'/>
  <seriesInfo name='DOI' value='10.17487/RFC8613'/>
</reference>

<reference anchor='RFC8768' target='https://www.rfc-editor.org/info/rfc8768'>
  <front>
    <title>Constrained Application Protocol (CoAP) Hop-Limit Option</title>
    <author fullname='M. Boucadair' initials='M.' surname='Boucadair'/>
    <author fullname='T. Reddy.K' initials='T.' surname='Reddy.K'/>
    <author fullname='J. Shallow' initials='J.' surname='Shallow'/>
    <date month='March' year='2020'/>
    <abstract>
      <t>The presence of Constrained Application Protocol (CoAP) proxies may lead to infinite forwarding loops, which is undesirable. To prevent and detect such loops, this document specifies the Hop-Limit CoAP option.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8768'/>
  <seriesInfo name='DOI' value='10.17487/RFC8768'/>
</reference>

<reference anchor='RFC9177' target='https://www.rfc-editor.org/info/rfc9177'>
  <front>
    <title>Constrained Application Protocol (CoAP) Block-Wise Transfer Options Supporting Robust Transmission</title>
    <author fullname='M. Boucadair' initials='M.' surname='Boucadair'/>
    <author fullname='J. Shallow' initials='J.' surname='Shallow'/>
    <date month='March' year='2022'/>
    <abstract>
      <t>This document specifies alternative Constrained Application Protocol (CoAP) block-wise transfer options: Q-Block1 and Q-Block2.</t>
      <t>These options are similar to, but distinct from, the CoAP Block1 and Block2 options defined in RFC 7959. The Q-Block1 and Q-Block2 options are not intended to replace the Block1 and Block2 options but rather have the goal of supporting Non-confirmable (NON) messages for large amounts of data with fewer packet interchanges. Also, the Q-Block1 and Q-Block2 options support faster recovery should any of the blocks get lost in transmission.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9177'/>
  <seriesInfo name='DOI' value='10.17487/RFC9177'/>
</reference>

<reference anchor='RFC7959' target='https://www.rfc-editor.org/info/rfc7959'>
  <front>
    <title>Block-Wise Transfers in the Constrained Application Protocol (CoAP)</title>
    <author fullname='C. Bormann' initials='C.' surname='Bormann'/>
    <author fullname='Z. Shelby' initials='Z.' role='editor' surname='Shelby'/>
    <date month='August' year='2016'/>
    <abstract>
      <t>The Constrained Application Protocol (CoAP) is a RESTful transfer protocol for constrained nodes and networks. Basic CoAP messages work well for small payloads from sensors and actuators; however, applications will need to transfer larger payloads occasionally -- for instance, for firmware updates. In contrast to HTTP, where TCP does the grunt work of segmenting and resequencing, CoAP is based on datagram transports such as UDP or Datagram Transport Layer Security (DTLS). These transports only offer fragmentation, which is even more problematic in constrained nodes and networks, limiting the maximum size of resource representations that can practically be transferred.</t>
      <t>Instead of relying on IP fragmentation, this specification extends basic CoAP with a pair of "Block" options for transferring multiple blocks of information from a resource representation in multiple request-response pairs. In many important cases, the Block options enable a server to be truly stateless: the server can handle each block transfer separately, with no need for a connection setup or other server-side memory of previous block transfers. Essentially, the Block options provide a minimal way to transfer larger representations in a block-wise fashion.</t>
      <t>A CoAP implementation that does not support these options generally is limited in the size of the representations that can be exchanged, so there is an expectation that the Block options will be widely used in CoAP implementations. Therefore, this specification updates RFC 7252.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7959'/>
  <seriesInfo name='DOI' value='10.17487/RFC7959'/>
</reference>

<reference anchor='RFC9175' target='https://www.rfc-editor.org/info/rfc9175'>
  <front>
    <title>Constrained Application Protocol (CoAP): Echo, Request-Tag, and Token Processing</title>
    <author fullname='C. Amsüss' initials='C.' surname='Amsüss'/>
    <author fullname='J. Preuß Mattsson' initials='J.' surname='Preuß Mattsson'/>
    <author fullname='G. Selander' initials='G.' surname='Selander'/>
    <date month='February' year='2022'/>
    <abstract>
      <t>This document specifies enhancements to the Constrained Application Protocol (CoAP) that mitigate security issues in particular use cases. The Echo option enables a CoAP server to verify the freshness of a request or to force a client to demonstrate reachability at its claimed network address. The Request-Tag option allows the CoAP server to match block-wise message fragments belonging to the same request. This document updates RFC 7252 with respect to the following: processing requirements for client Tokens, forbidding non-secure reuse of Tokens to ensure response-to-request binding when CoAP is used with a security protocol, and amplification mitigation (where the use of the Echo option is now recommended).</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9175'/>
  <seriesInfo name='DOI' value='10.17487/RFC9175'/>
</reference>


<reference anchor='I-D.ietf-core-comi' target='https://datatracker.ietf.org/doc/html/draft-ietf-core-comi-16'>
   <front>
      <title>CoAP Management Interface (CORECONF)</title>
      <author fullname='Michel Veillette' initials='M.' surname='Veillette'>
         <organization>Trilliant Networks Inc.</organization>
      </author>
      <author fullname='Peter Van der Stok' initials='P.' surname='Van der Stok'>
         <organization>consultant</organization>
      </author>
      <author fullname='Alexander Pelov' initials='A.' surname='Pelov'>
         <organization>Acklio</organization>
      </author>
      <author fullname='Andy Bierman' initials='A.' surname='Bierman'>
         <organization>YumaWorks</organization>
      </author>
      <author fullname='Carsten Bormann' initials='C.' surname='Bormann'>
         <organization>Universität Bremen TZI</organization>
      </author>
      <date day='4' month='September' year='2023'/>
      <abstract>
	 <t>   This document describes a network management interface for
   constrained devices and networks, called CoAP Management Interface
   (CORECONF).  The Constrained Application Protocol (CoAP) is used to
   access datastore and data node resources specified in YANG, or SMIv2
   converted to YANG.  CORECONF uses the YANG to CBOR mapping and
   converts YANG identifier strings to numeric identifiers for payload
   size reduction.  CORECONF extends the set of YANG based protocols,
   NETCONF and RESTCONF, with the capability to manage constrained
   devices and networks.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-core-comi-16'/>
   
</reference>


<reference anchor='I-D.ietf-schc-architecture' target='https://datatracker.ietf.org/doc/html/draft-ietf-schc-architecture-01'>
   <front>
      <title>Static Context Header Compression (SCHC) Architecture</title>
      <author fullname='Alexander Pelov' initials='A.' surname='Pelov'>
         <organization>IMT Atlantique</organization>
      </author>
      <author fullname='Pascal Thubert' initials='P.' surname='Thubert'>
         </author>
      <author fullname='Ana Minaburo' initials='A.' surname='Minaburo'>
         <organization>Consultant</organization>
      </author>
      <date day='6' month='October' year='2023'/>
      <abstract>
	 <t>   This document defines the SCHC architecture.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-schc-architecture-01'/>
   
</reference>




    </references>



<section anchor="AnnexA"><name>YANG Data Model</name>

<figure><artwork><![CDATA[
<CODE BEGINS> file "ietf-schc-access-control@2023-02-14.yang"
module ietf-schc-access-control {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-schc-access-control";
  prefix schc-ac;

  import ietf-schc {
      prefix schc;
  }

  organization
    "IETF IPv6 over Low Power Wide-Area Networks (lpwan) working group";
  contact
    "WG Web:   <https://datatracker.ietf.org/wg/lpwan/about/>
     WG List:  <mailto:lp-wan@ietf.org>
     Editor:   Juan-Carlos Zuniga
       <mailto:juancarlos.zuniga@sigfox.com>";
  description
     "
     Copyright (c) 2021 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Simplified BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX
     (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
     for full legal notices.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
     they appear in all capitals, as shown here.

     *************************************************************************

     This module extends the ietf-schc module to include the compound-ack 
     behavior for Ack On Error as defined in RFC YYYY. 
     It introduces a new leaf for Ack on Error defining the format of the
     SCHC Ack and add the possibility to send several bitmaps in a single 
     answer.";

  revision 2023-02-14 {
    description
      "Initial version for RFC YYYY ";
    reference
      "RFC YYYY: Compound Ack";
  }

  typedef rule-access-right {
    type enumeration {
      enum no-changes {
        value 0;
        description
          "No change are allowed.";
      }
      enum modify-existing-element {
        value 1;
        description
          "can modify content inside an element.";
      }
      enum add-remove-element {
        value 2;
        description
          "Allows to add or remove or modify an element.";
      }
    }
  }

  typedef field-access-right {
    type enumeration {
      enum no-change {
        value 0;
        description
          "Reserved slot number.";
      }
      enum change-tv {
        value 1;
        description
          "Reserved slot number.";
      }
      enum change-mo-cda-tv {
        value 2;
        description
          "Reserved slot number.";
      }
    }

  }

  augment "/schc:schc/schc:rule" {
    leaf ac-modify-set-of-rules {
          config false;
          type rule-access-right;
        }
  }

  augment "/schc:schc/schc:rule/schc:nature/schc:compression" {
    leaf ac-modify-compression-rule {
          config false;
          type rule-access-right;
        }
  }

  augment "/schc:schc/schc:rule/schc:nature/schc:compression/schc:entry" {
    leaf ac-modify-field {
          config false;
          type field-access-right;
        }
  }

  augment "/schc:schc/schc:rule/schc:nature/schc:fragmentation" {
    leaf ac-modify-timers {
          config false;
          type boolean;
        }
  }


}
<CODE ENDS>
]]></artwork></figure>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>TBD</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>TBD</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

